Exploiting Beam Features for Spoofing Attack Detection in mmWave 60-GHz IEEE 802.11ad Networks
暂无分享,去创建一个
Kai Zeng | Long Jiao | Ning Wang | Pu Wang | Weiwei Li | K. Zeng | Pu Wang | Weiwei Li | Ning Wang | Long Jiao
[1] Weihua Zhuang,et al. PHY-Layer Spoofing Detection With Reinforcement Learning in Wireless Networks , 2016, IEEE Transactions on Vehicular Technology.
[2] Le Song,et al. Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection , 2018 .
[3] Edward W. Knightly,et al. IEEE 802.11ad: directional 60 GHz communication for multi-Gigabit-per-second Wi-Fi [Invited Paper] , 2014, IEEE Communications Magazine.
[4] Dennis Goeckel,et al. Identifying Wireless Users via Transmitter Imperfections , 2011, IEEE Journal on Selected Areas in Communications.
[5] Aydin Behnad,et al. Performance enhancement of I/Q imbalance based wireless device authentication through collaboration of multiple receivers , 2014, 2014 IEEE International Conference on Communications (ICC).
[6] Xianbin Wang,et al. Physical Layer Authentication for Mobile Systems with Time-Varying Carrier Frequency Offsets , 2014, IEEE Transactions on Communications.
[7] Ting Jiang,et al. Physical layer spoofing detection based on sparse signal processing and fuzzy recognition , 2017, IET Signal Process..
[8] Dimitrios Koutsonikolas,et al. Physical Layer Identification Based on Spatial–Temporal Beam Features for Millimeter-Wave Wireless Networks , 2019, IEEE Transactions on Information Forensics and Security.
[9] Justin Salamon,et al. Deep Convolutional Neural Networks and Data Augmentation for Environmental Sound Classification , 2016, IEEE Signal Processing Letters.
[10] Dimitrios Koutsonikolas,et al. Poster: X60: A Programmable Testbed for Wideband 60 GHz WLANs with Phased Arrays , 2017, MobiCom.
[11] Ning Wang,et al. Physical-Layer Authentication Based on Extreme Learning Machine , 2017, IEEE Communications Letters.
[12] Ning Wang,et al. Efficient Identity Spoofing Attack Detection for IoT in mm-Wave and Massive MIMO 5G Communication , 2018, 2018 IEEE Global Communications Conference (GLOBECOM).
[13] Ning Wang,et al. Physical-Layer Security of 5G Wireless Networks for IoT: Challenges and Opportunities , 2019, IEEE Internet of Things Journal.
[14] Xianbin Wang,et al. A two dimensional quantization algorithm for CIR-based physical layer authentication , 2013, 2013 IEEE International Conference on Communications (ICC).
[15] J. Sobana,et al. Detection and Localization of Multiple Spoofing Attackers in Wireless Networks , 2014 .
[16] Debayan Das,et al. RF-PUF: Enhancing IoT Security Through Authentication of Wireless Nodes Using In-Situ Machine Learning , 2018, IEEE Internet of Things Journal.
[17] Jörg Widmer,et al. Compressive Millimeter-Wave Sector Selection in Off-the-Shelf IEEE 802.11ad Devices , 2017, CoNEXT.
[18] Gary Steri,et al. A Survey of Techniques for the Identification of Mobile Phones Using the Physical Fingerprints of the Built-In Components , 2017, IEEE Communications Surveys & Tutorials.
[19] Gilles Roussel,et al. Syntax tree fingerprinting for source code similarity detection , 2009, 2009 IEEE 17th International Conference on Program Comprehension.
[20] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[21] Wen-Long Chin,et al. Authentication scheme for mobile OFDM based on security information technology of physical layer over time-variant and multipath fading channels , 2015, Inf. Sci..
[22] Michał Grochowski,et al. Data augmentation for improving deep learning in image classification problem , 2018, 2018 International Interdisciplinary PhD Workshop (IIPhDW).
[23] Prasant Mohapatra,et al. Identity-based attack detection in mobile wireless networks , 2011, 2011 Proceedings IEEE INFOCOM.
[24] Ning Wang,et al. Machine Learning-based Spoofing Attack Detection in MmWave 60GHz IEEE 802.11ad Networks , 2020, IEEE INFOCOM 2020 - IEEE Conference on Computer Communications.
[25] Shauna Revay,et al. Deep Learning for RF Device Fingerprinting in Cognitive Communication Networks , 2018, IEEE Journal of Selected Topics in Signal Processing.
[26] Liang Zhao,et al. Prediction-time Efficient Classification Using Feature Computational Dependencies , 2018, KDD.
[27] José M. F. Moura,et al. A Deep Learning Approach to IoT Authentication , 2018, 2018 IEEE International Conference on Communications (ICC).
[28] Arnab Roy,et al. A Tutorial on Beam Management for 3GPP NR at mmWave Frequencies , 2018, IEEE Communications Surveys & Tutorials.
[29] Narasimhan Sundararajan,et al. A Fast and Accurate Online Sequential Learning Algorithm for Feedforward Networks , 2006, IEEE Transactions on Neural Networks.
[30] Sanjay Jha,et al. DLINK: Dual link based radio frequency fingerprinting for wearable devices , 2015, 2015 IEEE 40th Conference on Local Computer Networks (LCN).